Distributed OS: Winter 2011: Difference between revisions
No edit summary |
|||
Line 4: | Line 4: | ||
January 18, 2011: [http://homeostasis.scs.carleton.ca/~soma/distos/2008-02-25/oceanstore-sigplan.pdf OceanStore] and [http://homeostasis.scs.carleton.ca/~soma/distos/2008-02-25/fast2003-pond.pdf Pond] | January 18, 2011: [http://homeostasis.scs.carleton.ca/~soma/distos/2008-02-25/oceanstore-sigplan.pdf OceanStore] and [http://homeostasis.scs.carleton.ca/~soma/distos/2008-02-25/fast2003-pond.pdf Pond] | ||
==Internet Governance== | |||
===Problems to Solve=== | |||
*Attack computers with almost no consequences | |||
**DDoS | |||
**botnets | |||
**capture and analyze private traffic | |||
**distribute malware | |||
**tampering with traffic | |||
**Unauthorized access to data and resources | |||
**Impersonate computers, individuals, applications | |||
**Fraud, theft |
Revision as of 18:50, 18 January 2011
Readings
January 13, 2011: CCR (two papers)
January 18, 2011: OceanStore and Pond
Internet Governance
Problems to Solve
- Attack computers with almost no consequences
- DDoS
- botnets
- capture and analyze private traffic
- distribute malware
- tampering with traffic
- Unauthorized access to data and resources
- Impersonate computers, individuals, applications
- Fraud, theft